Security analysis of permission re-delegation vulnerabilities in Android apps

BF Demissie, M Ceccato, LK Shar - Empirical Software Engineering, 2020 - Springer
The Android platform facilitates reuse of app functionalities by allowing an app to request an
action from another app through inter-process communication mechanism. This feature is …

A taxonomy of privilege escalation attacks in Android applications

M Rangwala, P Zhang, X Zou… - International Journal of …, 2014 - inderscienceonline.com
Google's Android is one of the most popular mobile operating system platforms today, being
deployed on a wide range of mobile devices from various manufacturers. It is termed as a …

APSET, an Android aPplication SEcurity Testing tool for detecting intent-based vulnerabilities

S Salva, SR Zafimiharisoa - International Journal on Software Tools for …, 2015 - Springer
The Android messaging system, called intent, is a mechanism that ties components together
to build applications for smartphones. Intents are kinds of messages composed of actions …

Data vulnerability detection by security testing for Android applications

S Salva, SR Zafimiharisoa - 2013 Information Security for …, 2013 - ieeexplore.ieee.org
The Android intent messaging is a mechanism that ties components together to build Mobile
applications. Intents are kinds of messages composed of actions and data, sent by a …

A sink-driven approach to detecting exposed component vulnerabilities in android apps

D Wu, X Luo, RKC Chang - arXiv preprint arXiv:1405.6282, 2014 - arxiv.org
Android apps could expose their components for cooperating with other apps. This
convenience, however, makes apps susceptible to the exposed component vulnerability …

Security testing of second order permission re-delegation vulnerabilities in android apps

BF Demissie, M Ceccato - Proceedings of the IEEE/ACM 7th …, 2020 - dl.acm.org
In Android, inter-app communication is a cornerstone feature where apps exchange special
messages called Intents in order to integrate with each other and deliver a rich end-user …

Android 平台下整合控制流與操作碼之惡意程式分析

YC Wang - 2018 - ir.lib.ncu.edu.tw
摘要(中) 現今的行動惡意程式數量增長的越來越快, 分析大量的應用程式為現今學者專注的項目,
本研究依照惡意程式家族對應用程式進行分類, 以增進整個分析的過程的效率 …

Detection and deterrence from data collecting applications in Android

PK Tiwari, T Velayutham - 2016 Fourth International …, 2016 - ieeexplore.ieee.org
As Android User's and its application market is growing; android applications tend to collect
user's data for various purposes; for advertisement agencies, for better user experiences …

On the road with third-party apps-Security, safety and privacy aspects of in-vehicle apps

B Eriksson, J GROTH - 2018 - odr.chalmers.se
In recent years the automotive industry has started to digitise their vehicles. Traditionally
cars have been equipped with radio, cassette or CD-players and more recently so-called …

Labware for networking protocols and wireless security using Android-enabled mobile devices

DC Lo, K Qian, V Clincy, H Shahriar… - Proceedings of the 2014 …, 2014 - dl.acm.org
The massive growth in the mobile phone and handheld device markets has created an
impact on computer science education, especially in curricula for wireless networking …